Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 07:47

General

  • Target

    JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe

  • Size

    720KB

  • MD5

    0314165d358e7ec5345000bd372d362d

  • SHA1

    8d8633c6b7b73825aaa833005e0e58b5e2a5d7df

  • SHA256

    f92a7ef3552964bf4ecdacec1bd1868b6ec0627ec19f12e2d8d09df51e4df972

  • SHA512

    a8db9864db7fd1c826e7de606519cc6b9a233f094faec41cc3eee678b8b1f25750af425068d3b1a22279b6ef03b5348052789a8ea7c4cd93ba293faaef74a5a9

  • SSDEEP

    12288:dc//////t1F8gjXVAMSe68G5IBDvu8W/SAIyUWLd370kQ7/FAgvQXCdQHG8lgSTN:dc//////tvhjNY80JvUWL1oAgpQHG8ua

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0314165d358e7ec5345000bd372d362d.exe
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    633323b0276febd62eaddb61c75ef2ff

    SHA1

    6a8b666262b7d81ddc712034a3ec26c8e23a9ee4

    SHA256

    ce515e13691bf58cc759d64a6586d3395b52d828a76d7d0f7461ca8dea7e1f3f

    SHA512

    f167b5a3b0f70cc45ca2b5ffcb718c6e2434c4e3248ba778f2e22cd350bb3b67eda9b159e3ab1065ebe7c5d9cb4d4ea951d931db91a97c8f80ffd3050152108b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4091bcd89f5dba4b3f46945bea005783

    SHA1

    fcbc979ea2fb434295ae1fe41ddb96e0ebef5ab8

    SHA256

    8acb7796b6734dba45b6977ada1377b25a9174d4727d0e1e14bf371d3999a993

    SHA512

    325d19bebb5317f6fe8a632b2f6965c714be88b237f9070cdfef36ca466782f9f671225e48dec4a26626ea8f490f75e48821dc9ba3a7d76dc4c61c8c47fb257b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64bd335b25b87a4fdd5c8568bea926d4

    SHA1

    ea4463ba9dfe0efa80fe00a254926e4423df1de6

    SHA256

    ed67618ac6840ca452c6a72e05b49dce2a56b10efa13932d5b73f38e36a04020

    SHA512

    2cf83b48b9fe278212505c77212dc66d1f25dd2b1dbdc72eb82cc1ab3dc45757985ca818fba5e0edfc3b3665a9f219ea1635fc16c50002f0942cf7b942020623

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bba3cd7ec256fe888d47f1d24169207c

    SHA1

    4e1899c5c439c39b6eca789fe1405bb46f6c41eb

    SHA256

    283af44870dd6a0626db546c7cd3d5941d6e098bda3d76233a1285f290c23e44

    SHA512

    646793ab613ff4b728a9376c3eb8b45737aec82fd237e137ac9dface1c2390d5f10dfd170bcde5ddb0e55cc79111b57d6fa774da9fb88103301ded1e79429d3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8e7c4dc8298fcce75a230cda7a8dd23

    SHA1

    eeeb62ef6b904dd1ccd19fd457a8f525e040db5a

    SHA256

    3dd71abf16d210580843d4c50540e59b904f53b4c3817fc41d4ddaaa287df837

    SHA512

    032438cc4cd8760c835c3edc3fc4623fd9b2873be196ac3cb3bd623153a9ae6fddd0e7c23a74dca0b769ba1a1800c7b2422c34056cbd7251574bdc9c81eb2fc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb62736ab5e7dd4641bc23a118d8b6aa

    SHA1

    d8fc4efb7b27d50fbb899b683ef0618b7f4e1a37

    SHA256

    05b382e9e9d610bee2837256bad4e00af9a687a7bfb8b23fe8b6899dc6def82b

    SHA512

    62b316a54f255e1d29a93af07cb5aa0f62b73b4a8813e6bcbbea6c8e6a74c38bb7056291c6bb92b40599fe1ed334574a74b93bc71bb24f22b0f35e76e2b8485d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8492e81a13fba06e37c9251e2b32d286

    SHA1

    15ea2fc9707fff14f633db89cdfb9854425943f8

    SHA256

    2f3b79737acb3279478136ada0065799578da27b040f5c891089553e67873023

    SHA512

    0dcc52e997cf4fe92acf24cbd667c6794c2ea9bc53f5211e04bee9c05a5e527492ad62cad7e147accb7e192d1c725a79050a9f9604a54196e0969897923122df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cefdc8b362e21e08638bb7a67dcf94c

    SHA1

    5df1a83859b305005441c545f91505be83b0c6e6

    SHA256

    83fda9128fbac0919e30b5b5a2a6048f068c3ed8501315db4f75e7a76c6c4e8a

    SHA512

    3d2ac6ec08f0d71606370bf7f5d51aedcfbeba55d2735f60fb9463416a9a1ca57d80ded0c63ac43a06863b58a98155cc9c9c1d0691c81bfda433a65a3d15147c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    110ac4c36d5cbe308723d81d1cf332aa

    SHA1

    495a469723577da40ec2e1b2b4028e170ca74db9

    SHA256

    0b447afab620fcb3b6314e1fd826d0cb3d237e9f5baf6820a5f7d4c17c50eb8c

    SHA512

    4ea404bd280d6399b08e19d8377db603a9e6dab73d1788846b2d904b382d986c664d0d3a65413fe3ef21f7ada47c2050648ce33d40f0c3b2227b0d7ab58b3061

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb523b607b34780aad04a7f7b53046f2

    SHA1

    9a14c21408cafa4f373c5196b0e98c30b6cddc10

    SHA256

    beef01a132e092f22b052299e19c2fadaed470b071dcae133f52fb353b2ee261

    SHA512

    eb263ef91279139d5713a099cb0b8f2928ac0a84491bfdcece0b2faec3f9e64050c49c0cdae57ec4d3db55ef0fcff0714f6c0c8b0fa5d6c1ec0a4f2d6afbf61d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfd68af550c72d0722071b2da38176e3

    SHA1

    ff3d24b26936d360f6667e86c8a5469c878ddc73

    SHA256

    11677092c29da8bf9a4b13917a13a6d513ed4a7a15b69e2c93846c97286d2ba8

    SHA512

    005eb65877d47eb31cb7e6f9f1fef813928194f4faa5710d1502f04ff9a2a9bbd4f0a78140e3b6a24bc96cd68a076d70bddfa0289e733bebe1a49a60a835ff08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    416a2159b202ae880efc59ff012cdeb1

    SHA1

    454465513017f3c84fe2ef8f85f81a7498725358

    SHA256

    9a1fcd3366931914446c21c51b88c9c329b6d6004e18a459f36e6b430fe831e1

    SHA512

    6ea695dff403cf9e3708b930170e92d44295fa0c623e9099450eae392ff84af7a0d3fc99f24a6ae5c04f2ba3caccd57eefc20746babcf43c96eb3157fc297fd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    154babd4188d4be1771fb18eaa919b4c

    SHA1

    985eea12d51f638d11d84b438bbcbf8e71c6eb22

    SHA256

    256d7352ae4fa9e500ce7efc55c1be519b059c595a3fc6693086e44eb25f8ba2

    SHA512

    fa1643152d3a9ab9c8da1907a80950e307e12cb6902ff1bc76fb76063bfe81c29282a79260f509429bed15a69b168127374af3c0913be0ca5c2b52c16b90b552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    118249322c0e6e79a13a98ff31c95de9

    SHA1

    45a5553ada7a6ed4c68b836de74a377242ed95d7

    SHA256

    b26b73ac927b38a417806a47fe73a420429a7b24a3672e0ff5bd69dbd7d5b3ab

    SHA512

    d4fc1bac641eacf73fe44b4f5d882a726320f6655ddf439302751c4e8842bec1c39eac91c44597f898a156291b3823ac4596a4a012038320e466297895cbe477

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84b2b99378fc30bd42dc5e6609095153

    SHA1

    dea3c54cb73bd115d711e180a6c65f0ab6c52317

    SHA256

    32896d806ab9af4cc547b1bad2744eb27b8a9365b81a9e81dc641944d1a2a924

    SHA512

    69e22cf6345c3b7962ced72679df454a9509ab82aa458c7f41d462b765d5b9cde4eaaaaffcc39b945cb1845a0db6fbb4073c433ca4eeb10dc3b6861809eb472e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f48fcb529249e98ef01006fd192dfbfe

    SHA1

    cb560fff084641b3e865c0d21b373af05aec9edb

    SHA256

    5ec4f3faa078b614173d597cd8cbd42ccf73054ac6e7b58da719dfaaac571706

    SHA512

    b605a16fe815c6290ef77e1515c81d420d43f610d84912ebd398906a4ea83935b6bf1d669b8255d9a12a2b6220f4716e650bf617c88c3632b8688ba90760816e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    080eae8784e4aa4a2c1e8fafe42d362e

    SHA1

    3d4461ca807d91ca009db1b0b9c0ce43c85602d9

    SHA256

    00f8e2e4ba2103a0902380c8b4bf4291a0ae1cc6c1ad62d39f33b246acd16c9e

    SHA512

    99f054a53e732c6afb98b65c56201e06ca35e4458204f4d1fe2037194b7cb21cc305a1db40c65322f5750b670d3689c64bf6d5fece2b66f9bf8f198543049834

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8044dfd3ef7a0ae7e69b67b15bf9557

    SHA1

    7d1caafa897c04b2e1d83b435cd1b178559b8b5c

    SHA256

    13ca5a3689395c94afcb429d05163f22baff8334272627acf2b6e26cb6f26184

    SHA512

    6b0dbf5a27a2bf7d7905c876daf8b45514c60faaec85b2fdb5453ebf4ad950bd7151dce495b6b277ee661cd35fa9aa8a2eb82a391578c3b14eaf63c89ebe2f84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b90051be7904daef738022c7b7424770

    SHA1

    e523c944e488949751a40804ad5fefdb0f8fe0fa

    SHA256

    2af65245ee38d1b75661728a85b16b5b17f9d51a16e618f0e2723af5ccf8116f

    SHA512

    be032d1017612c82edc1bd89d28d28bd5be3fb6d865f3e25fbf7df6be40b90405e56c288e7114bf24a651a41f895c416372fe550d570d0dad05f2a128dbd809e

  • C:\Users\Admin\AppData\Local\Temp\CabB878.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB8E9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1912-5-0x0000000000400000-0x00000000004B9000-memory.dmp

    Filesize

    740KB

  • memory/2248-11-0x0000000000190000-0x0000000000249000-memory.dmp

    Filesize

    740KB

  • memory/2404-2-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2404-6-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2404-4-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2404-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2404-7-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2404-14-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2404-9-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2404-8-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB